quot;This is found in the Library workspace, go to Lists, use the filter to find Incident Sources, click Add Item, scroll down and edit the new item name. That source will now be available to all IRsquot;

Question No: 163 – (Topic 8)

Your company has a private cloud that is managed by using a System Center 2012 infrastructure.

You have a web application named App1 that is hosted in another datacenter. The datacenter is not part of the private cloud.

You need to ensure that Service Manager incidents are generated automatically when App1 is unavailable.

The software update point is required on the central administration site and primary sites to enable software updates compliance assessment and to deploy software updates to clients.

The software update point is optional on secondary sites.

The software update point site system role must be created on a server that has WSUS installed.

The software update point interacts with the WSUS services to configure software update settings and request synchronization of software updates metadata.

When you have a Configuration Manager hierarchy, install and configure the software update point on the central administration site first, then on child primary sites, and then optionally on secondary sites.

When you have a stand-alone primary site (no central administration site), install and configure the software update point on the primary site first, and then optionally on secondary sites.

Some settings are only available when you configure the software update point on a central administration site, or stand-alone primary site, and there are different options that you must consider depending on where the software update point is installed.

Question No: 166 – (Topic 8)

Your company has a datacenter in Los Angeles that contains a private cloud. The private cloud is managed by using a System Center 2012 Virtual Machine Manager (VMM) infrastructure.

You create a host group named HG1. You move several Hyper-V hosts to HG1. You plan to manage Windows updates for the hosts in HG1 by using VMM.

An administrator creates a baseline as shown in the exhibit. (Click the Exhibit button.)

You discover that the updates defined in the baseline are not applied to the hosts in HG1. You need to ensure that the required updates are deployed to the hosts in HG1.

What should you do?

Copy the required updates to the VMM library server.

Modify the properties of HG1.

Copy the Virtual Machine template to an alternate location.

Modify the properties of the baseline.

Synchronize the Windows Server Update Services (WSUS) server.

Answer: D

Question No: 167 – (Topic 8)

You use System Center 2012 R2 Service Manager to manage incident requests. You need to create a service level objective (SLO).

Which three items should you include in the SLO? Each correct answer presents part of the solution.

In the Actions pane is an option called quot;Change target type…quot; that will bring up the same Select a Target Type dialog box that you see when you select the target for a rule/monitor. This view will list all instances of the target class you select.

You can validate which agents have an instance of that class and how many instances each has.

If there are no instances listed, then the rule isn#39;t going to do anything.

If there are instances, then you not only be confident that the rule/monitor will execute on the agent, but you can also view the properties of the instance that will be accessible to any rules/monitors targeted at it.

http://blogs.technet.com/b/brianwren/archive/2007/08/22/targeting-rules-and-monitors.aspx NOTE: The text below was copied from a duplicate question https://social.technet.microsoft.com/wiki/contents/articles/7205.operations-manager- dynamicgroup-examples.aspx

Operations Manager Dynamic Group Examples

In Operations Manager, groups are logical collections of objects, such as Windows-based computers, hard disks, or instances of Microsoft SQL Server.

Groups are populated by explicitly adding objects to the group or dynamically according to criteria you set.

For more information on the use of groups, see Creating and Managing Groups in the Operations Guide.

This article provides example of group definitions.

The examples describe the items to select in the Query Builder and the resulting formula:

Question No: 170 HOTSPOT – (Topic 8)

You plan to create priority-based service level objectives (SLOs) for all work item types. The priorities will be assigned automatically based on the urgency and the impact of a work item.

You need to identify how to implement the priorities for each work item.

What should you identify? In the table below, identify which work items can be implemented by using the work item settings or a custom workflow and which work items can be implemented only by using a custom workflow. Make only one selection in each row.

Answer:

Topic 9, Contoso, Ltd (B) Overview

Contoso, Ltd. is a manufacturing company.

Contoso has a main office and six branch offices. The main office is located in Toronto. The branch offices are located in New York, Seattle, Miami, Montreal, Los Angeles, and Vancouver.

Existing Environment

Active Directory Environment

The network contains an Active Directory forest named contoso.com. The forest contains a child domain for each office.

Four servers are unused and are being considered as potential Hyper-V hosts. The servers are configured as shown in the following table.

All of the servers being considered as potential Hyper-V hosts have both locally attached storage and access to a SAN.

Help Desk Environment

Contoso uses a help desk ticketing system that was developed in-house. Fifty help desk agents have access to the ticketing system.

The ticketing system currently tracks:

->An average of two new incidents per month, per client computer

->An average of 2,000 change requests per month

Disaster Recovery Environment

Contoso uses a third-party backup solution. Backups are scheduled for the servers in the Seattle office as follows:

->The daily incremental backups total 10 GB.

->The total size of data to back up is 100 GB.

->Backed up data is retained for 10 business days.

Problem Statements

The original developers of the help desk ticketing system are no longer employed by Contoso and maintenance of the system is becoming an issue.

Requirements

Planned Changes

Contoso plans to move the IT infrastructure to a private cloud.

Whenever possible, hardware and software costs must be minimized.

Contoso plans to open a small office in Beijing. System Center 2012 App Controller will be used to manage applications. The display names of the applications will be in Simplified Chinese Pinyin IME.

New physical servers will be deployed by using System Center 2012 Configuration Manager from a server named Server5. Server5 will also be a PXE service point.

The current backup solution will be replaced with System Center 2012 Data Protection Manager (DPM).

A public key infrastructure (PKI) will be deployed to issue and manage certificates. The PKI deployment must be made as secure as possible.

Hardware load balancers will be deployed for use in the deployment of private cloud services.

Cloud Requirements

Contoso plans to implement a cloud solution that meets the following requirements:

->Stores all virtual machines on the SAN only.

->Uses SAN copy to provision the virtual machines.

->Provides the ability to manage the resolution of incidents.

->Contains managed virtual machines across both private and public clouds.

->Provides the ability to customize the settings of management packs provided by Microsoft.

->Collects security events from all of the servers running in the private cloud and provides centralized reporting on the events.

App1 Requirements

A new application named App1 will be deployed to the private cloud. App1 is a three-tier application that contains the following components:

->A front-end tier that runs a web server. The tier must be highly available and

capable of being quickly scaled out if required.

->A middle tier that runs an application server.

->A back-end tier that runs a database.

App2 Requirements

An application named App2 will be deployed to the public cloud. Users will be authenticated by using the on-premises Active Directory. The users must be able to access App2 without being prompted for authentication again.